Data Security


Homeland Security Launches Training For Countering Terrorists Exploitation of Social Media

Homeland Security Launches Training For Countering Terrorists Exploitation of Social Media

This online 90-minute training is designed to educate startup companies and social media companies about how terrorists may seek to exploit their platforms.

Do You Know Where Your Data Is?

Do You Know Where Your Data Is?

Educational institutions are a data treasure trove.

Apple to Focus on Privacy and Security in iOS 12

Apple to Focus on Privacy and Security in iOS 12

Apple has announced new settings to strengthen security on your mobile, laptop and tablet devices.

A Third of Companies Would Consider Paying Hackers

A Third of Companies Would Consider Paying Hackers

Several companies are opting for short-term reactive cybersecurity despite high profile ransomeware attacks.

Researchers Warn 500,000 Consumer Routers Infected with Malware

Researchers Warn 500,000 Consumer Routers Infected with Malware

Researchers find nearly half a million routers have been infected by malware.

The GDPR is Nearly Here: Are you ready?

The GDPR is Nearly Here: Are you ready?

If your business has customers who live in the European Union, you have an important deadline approaching.

Report Finds Over 75 Percent of IT Breaches are Motivated by Money

Report Finds Over 75 Percent of IT Breaches are Motivated by Money

A report by Verizon has found that 76 percent of breaches are financially motivated, and 68 percent of those breaches took months or longer to discover.

Homeland Security Unveils New Cybersecurity Strategy

Homeland Security Unveils New Cybersecurity Strategy

DHS works to create cybersecurity plan that encompasses all data.



Data Breach at Chili

Data Breach at Chili's Restaurant Leaves Credit and Debit Card Information Exposed

Patrons of Chili's might have had their credit and debit card data hacked earlier this year.

How VPN Help Organizations to Strengthen their Cybersecurity

How VPN Help Organizations to Strengthen Cybersecurity

A VPN creates an encrypted connection between your device and the remote private network.

Twitter Asks All Users to Change Their Password

Twitter Asks All Users to Change Their Password

A bug in the Twitter system caused people's passwords to be kept unmasked in an internal log.

Cybersecurity Firm Researches Sonification of DDoS Attacks

Cybersecurity Firm Researches Sonification of DDoS Attacks

What if we could listen in on network traffic instead of just looking at it on graphs?

Vulnerabilities Could Give Hackers Remote Access to VW, Audi Models

Vulnerabilities Could Give Hackers Remote Access to VW, Audi Models

Security researchers found that certain models from Volkswagen could be hacked and remotely controlled.

Amazons Alexa Could be Tricked into Spying on Users

Amazon's Alexa Could be Tricked into Spying on Users

Researchers at Checkmarx were able to build an Alexa skill which could be used to spy on users within earshot. Amazon has now closed the loophole.

Nearly Half of U.K. Factories Admit to Falling Victim of Cyberattack

Nearly Half of U.K. Factories Admit to Falling Victim of Cyberattack

A new survey found that 48 percent of U.K. factories have been hit by a cyberattack.

Facebook Announces Data Security Measures that Comply with EUs GDPR

Facebook Announces Data Security Measures that Comply with EUs GDPR

The social media platform has announced new opt outs that allow users to choose how their data is being used.

Hackers Can Find Your Healthcare Data in Under an Hour

Hackers Can Find Your Healthcare Data in Under an Hour

A new survey found that 38 percent of hackers believe they can access any healthcare data they want to in under an hour.

Russia Blamed for Coordinated Cyberattacks

Russia Blamed for Coordinated Cyberattacks

The hackers have tried to breach routers, switches and firewalls in an effort to breach organizations across the globe, according to officials.

Major Credit Card Companies No Longer Requiring Signatures

Major Credit Card Companies No Longer Requiring Signatures

The adoption of chip-enabled cards has rendered credit card signatures useless.

Zuckerburg Admits Fault, Facebook Releases List of Fixes

Zuckerberg Admits Fault, Facebook Releases List of Fixes

Mark Zuckerberg released his remarks to Congress following the Cambridge Analytica scandal.

Featured

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.